Resubmissions

09-04-2022 09:50

220409-lt7wfaddaj 3

09-04-2022 09:49

220409-ltdycsdcgp 3

General

  • Target

    task3.zip

  • Size

    4.5MB

  • MD5

    39527be37fba631d15b6f2ea7587157e

  • SHA1

    225e626e1e22b91f5db1247df2479e7935f2b061

  • SHA256

    0b3e3a2eec3d5a972993c241fe37f5a5c585f7aeb361da017ee58f531314156d

  • SHA512

    e1d287afd512678fc0c41746b15cc6abddd8c5345e419bc237b1bac1c71fe66a0e2389fb95f572d486de8fd127e6a3905a5e51e9a58e0120175c580c7e30c5d2

  • SSDEEP

    98304:rACSIshAceD+m5vyXtS50FQlY+wHo8gd74iJmniyYwXXoyd3l:EJhWvyR4YvHodd74iEPYwXRr

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • task3.zip
    .zip

    Password: infected

  • slides.pdf
    .pdf

    Password: infected

    • https://synthesis.to

    • https://anti-reversing.com/Downloads/Anti-Reversing/The_Ultimate_Anti-Reversing_Reference.pdf

    • http://www.ouah.org/linux-anti-debugging.txt

    • https://libstore.ugent.be/fulltxt/RUG01/002/367/296/RUG01-002367296_2017_0001_AC.pdf

    • https://www.gdatasoftware.com/blog/2020/05/36068-current-use-of-virtual-machine-detection-methods

    • https://tigress.wtf/transformations.html

    • https://synthesis.to/reve2/vm.ova

    • https://remnux.org

    • https://www.kali.org

  • task3.bin
    .sh linux